Shmoo Con 2019
Video Item Preview
Share or Embed This Item
- Publication date
- 2019-01-20
- Topics
- shmoocon, conference, shmoo, moose, hacker, computer, security, hacker, computer security, conference
- Language
- English
- Item Size
- 166.0G
ShmooCon 2019
by Shmoo Group, various presenters
The videos in this collection are from ShmooCon 2019, which occurred on 18-20 January 2019, at the Washington Hilton Hotel. Hope you like the new 1080 format! Also, and we apologize for this, but any video shot in the Belay It track had some visual issues. Each of those videos has a quick notification at the beginning.
Friday, January 18, 2019:
- Opening Remarks, Rumblings, Ruminations, and Rants
- Wendy Knox Everette - Incident Response and the Attorney Client Privilege
- John Amirrezvani - Ad-Laundering: Bribes & Backdoors
- Janith Weerasingh and Rachel Greenstadt - Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications
- David Huerta - How the Press Gets Pwned
- Sandra Gorka and Jacob Miller - Kinder Garten Security: Teaching the Pre-college Crowd
- Matt Blaze - It’s 2019 and Special Agent Johnny Still Can’t Encrypt
Firetalks:
- Firetalks Opening
- Kirsten Renner - Shut up and Listen
- Nicole Schwartz - Specialists versus Jack-Of-All-Trades
- Tarah Wheeler and Roy Iversen - Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign
- Jared Stroud - Weapons of Text Destruction
- Christine Giglio - Infosec and 9-1-1: When the Location of Your Emergency is in the Building
- Ray [Redacted] - Whats the latest 411 on 419s?
- Firetalks Closing
Saturday, January 19, 2019:
- Ariel Zelivansky - Writing a Fuzzer for Any Language with American Fuzzy Lop
- Kevin Bilzer, RJ Joyce, and Seamus Burke - High Confidence Malware Attribution using the Rich Header
- Jessica ‘Zhanna’ Malekos Smith - The Beginner’s Guide to the Musical Scales of Cyberwar
- Olivia Thet and Nicolas Kseib - CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger
- Douglas Bienstock - BECs and Beyond: Investigating and Defending Office 365
- Chris Cox - The APT at Home: The attacker that knows your mother’s maiden name
- Jared Rittle - Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC
- John O’Neil - Five-sigma Network Events (and how to find them)
- Amélie Koran - Firemen vs. Safety Matches: How the current skills pipeline is wrong
- Andrea Matwyshyn and Elliot Kaye - Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission
- Matt Blaze - Electronic Voting in 2018: Bad or Worse?
- Parker Thompson, Mudge, and Tim Carstens - Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack
- Omaha - Trip Wire(less)
- Michael Portera - Analyzing Shodan Images With Optical Character Recognition
- Francis Duff - Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™
- Andrew Wong and Phil Vachon - Social Network Analysis: A scary primer
- Ben Ridgway - Security Response Survival Skills
- Nina Kollars and Paul Brister - Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other
- Marc Soda - Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)
- Evan Jensen and Rudy Cuevas - iPhone Surgery for the Practically Paranoid
- Avi Zajac - A Little Birdy Told Me About Your Warrants
- Christian Paquin - Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker
- evm - A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries
- Emma Zaballos and Anne Addison Meriwether - A Tisket, a Tasket, a Dark Web Shopping Basket
- Xena Olsen - 24/7 CTI: Operationalizing Cyber Threat Intelligence
- The Shmoo Group - 0wn the Con
- Andrew Blaich and Michael Flossman - Behind Enemy Lines: Inside the operations of a nation state’s cyber program
Sunday, January 20, 2019:
- Conor Patrick - Building and Selling Solo, an Open Source Secure Hardware Token
- Falcon Darkstar - Looking for Malicious Hardware Implants with Minimal Equipment
- Soldier of FORTRAN - Deconstructing DeFeNeStRaTe.C
- Christopher Grayson and Marc Newlin - IPv666: Address of the Beast
- Adam Everspaugh - Un-f*$#ing Cloud Storage Encryption
- Adir Abraham - Reversing SR-IOV For Fun and Profit
- Parker Wiksell and Jewell Seay - Patchwerk: Kernel Patching for Fun and Profit
- Karl Koscher - IMSI Catchers Demystified
- Jeremy Gillula - Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet
- Whitney Merrill, LosT, Andrew Morris, and Bruce Potter (interviewer) - Between Two Moose
- Closing Remarks
----
--> Oodles of thanks to Archive for helping us keep these videos available and free!!
- Squidly1
by Shmoo Group, various presenters
The videos in this collection are from ShmooCon 2019, which occurred on 18-20 January 2019, at the Washington Hilton Hotel. Hope you like the new 1080 format! Also, and we apologize for this, but any video shot in the Belay It track had some visual issues. Each of those videos has a quick notification at the beginning.
Friday, January 18, 2019:
- Opening Remarks, Rumblings, Ruminations, and Rants
- Wendy Knox Everette - Incident Response and the Attorney Client Privilege
- John Amirrezvani - Ad-Laundering: Bribes & Backdoors
- Janith Weerasingh and Rachel Greenstadt - Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications
- David Huerta - How the Press Gets Pwned
- Sandra Gorka and Jacob Miller - Kinder Garten Security: Teaching the Pre-college Crowd
- Matt Blaze - It’s 2019 and Special Agent Johnny Still Can’t Encrypt
Firetalks:
- Firetalks Opening
- Kirsten Renner - Shut up and Listen
- Nicole Schwartz - Specialists versus Jack-Of-All-Trades
- Tarah Wheeler and Roy Iversen - Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign
- Jared Stroud - Weapons of Text Destruction
- Christine Giglio - Infosec and 9-1-1: When the Location of Your Emergency is in the Building
- Ray [Redacted] - Whats the latest 411 on 419s?
- Firetalks Closing
Saturday, January 19, 2019:
- Ariel Zelivansky - Writing a Fuzzer for Any Language with American Fuzzy Lop
- Kevin Bilzer, RJ Joyce, and Seamus Burke - High Confidence Malware Attribution using the Rich Header
- Jessica ‘Zhanna’ Malekos Smith - The Beginner’s Guide to the Musical Scales of Cyberwar
- Olivia Thet and Nicolas Kseib - CryptoLocker Deep-Dive: Tracking security threats on the Bitcoin public ledger
- Douglas Bienstock - BECs and Beyond: Investigating and Defending Office 365
- Chris Cox - The APT at Home: The attacker that knows your mother’s maiden name
- Jared Rittle - Process Control Through Counterfeit Comms: Using and Abusing Built-In Functionality to Own a PLC
- John O’Neil - Five-sigma Network Events (and how to find them)
- Amélie Koran - Firemen vs. Safety Matches: How the current skills pipeline is wrong
- Andrea Matwyshyn and Elliot Kaye - Be an IoT Safety Hero: Policing Unsafe IoT through the Consumer Product Safety Commission
- Matt Blaze - Electronic Voting in 2018: Bad or Worse?
- Parker Thompson, Mudge, and Tim Carstens - Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack
- Omaha - Trip Wire(less)
- Michael Portera - Analyzing Shodan Images With Optical Character Recognition
- Francis Duff - Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™
- Andrew Wong and Phil Vachon - Social Network Analysis: A scary primer
- Ben Ridgway - Security Response Survival Skills
- Nina Kollars and Paul Brister - Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other
- Marc Soda - Three Ways DuckDuckGo Protects User Privacy While Getting Things Done (and how you can too)
- Evan Jensen and Rudy Cuevas - iPhone Surgery for the Practically Paranoid
- Avi Zajac - A Little Birdy Told Me About Your Warrants
- Christian Paquin - Post-quantum Crypto: Today’s defense against tomorrow’s quantum hacker
- evm - A Code Pirate’s Cutlass: Recovering Software Architecture from Embedded Binaries
- Emma Zaballos and Anne Addison Meriwether - A Tisket, a Tasket, a Dark Web Shopping Basket
- Xena Olsen - 24/7 CTI: Operationalizing Cyber Threat Intelligence
- The Shmoo Group - 0wn the Con
- Andrew Blaich and Michael Flossman - Behind Enemy Lines: Inside the operations of a nation state’s cyber program
Sunday, January 20, 2019:
- Conor Patrick - Building and Selling Solo, an Open Source Secure Hardware Token
- Falcon Darkstar - Looking for Malicious Hardware Implants with Minimal Equipment
- Soldier of FORTRAN - Deconstructing DeFeNeStRaTe.C
- Christopher Grayson and Marc Newlin - IPv666: Address of the Beast
- Adam Everspaugh - Un-f*$#ing Cloud Storage Encryption
- Adir Abraham - Reversing SR-IOV For Fun and Profit
- Parker Wiksell and Jewell Seay - Patchwerk: Kernel Patching for Fun and Profit
- Karl Koscher - IMSI Catchers Demystified
- Jeremy Gillula - Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet
- Whitney Merrill, LosT, Andrew Morris, and Bruce Potter (interviewer) - Between Two Moose
- Closing Remarks
----
--> Oodles of thanks to Archive for helping us keep these videos available and free!!
- Squidly1
- Addeddate
- 2019-02-12 03:09:02
- Color
- color
- Identifier
- ShmooCon_2019
- Scanner
- Internet Archive HTML5 Uploader 1.6.4
- Sound
- sound
- Year
- 2019
comment
Reviews
There are no reviews yet. Be the first one to
write a review.
20,541 Views
6 Favorites
DOWNLOAD OPTIONS
IN COLLECTIONS
Conference ProceedingsUploaded by squidly1 on